Posts tagged blackhat

TrackingPoint's computer-augmented rifle sights, better known as the ShotView targeting system, have set off a wave of controversy and debate since they first debuted in 2014. That debate is about to get even hotter now that security researchers Runa Sandvik and Michael Auger have shown Wired a wa...

Fiat Chrysler Automobiles (FCA) will patch 1.4 million US vehicles following the reveal of a hacking method by Wired. The "voluntary safety recall" -- which it seems will come in the form of a USB dongle -- applies to vehicles equipped with 8.4-inch touchscreen in-car-entertainment systems. Affect...

Last week Chrysler quietly released a software update for its optional Uconnect in-car entertainment system. And while the official purpose was "to improve vehicle electronic security", Wired reports that the patch is really aimed at fixing a terrifying flaw in the system's security. One that coul...

What is it about hackers that invariably stumps Hollywood? Even when filmmakers get the details right, as Michael Mann does with Blackhat, his moody exploration of cyberterrorism, they often stumble when it comes to making us actually care about what's happening on screen. There are rare counterex...

Question: What is the title of that movie that revolves around a hacker (or two) caught up in a huge scheme or conspiracy that has something to do with a gargantuan corporation and/or the government?
Your choices are:
A.) Young-Angelina Jolie starrer Hackers
B.) Travolta, Berry and Jackman movie...

What's the easiest way to find out someone's password? Watch them enter it, of course, using the simple hacking technique known as shoulder surfing. Cameras and software have successfully been used by researchers to automate and improve the accuracy of snooping on smartphone users with such observ...

It's not hard to spot instances of state-sponsored hacking against dissidents and terrorism suspects, but it now appears that these attacks frequently target the press -- and more often than you see in the news. Google security engineers report that 21 of the top 25 media outlets worldwide have f...

Three Georgia Tech hackers demonstrated how to install malware on an iPhone using a custom charger at the Black Hat USA 2013 conference, according to a report in ZDNet. The hack exploits a vulnerability that is present in all shipping versions of iOS, but has been patched in the latest beta versio...

Pwnie Express has a knack for stuffing powerful security testing tools into innocuous housings, and this time they're flexing that unique talent with the Pwnie Plug R2. Ars Technica's gotten ahold of the contraption ahead of its debut at the Black Hat conference, and it's boasting a healthy number...

It's not like Toyota hasn't already faced its fair share of Prius braking issues, but it appears that even more headaches are headed its way at Defcon this week. Famed white hats Charlie Miller and Chris Valasek are preparing to unleash a 100-page paper at the annual hacker conference in Las Vegas...

Every GSM phone needs a SIM card, and you'd think such a ubiquitous standard would be immune to any hijack attempts. Evidently not, as Karsten Nohl of Security Research Labs -- who found a hole in GSM call encryption several years ago -- has uncovered a flaw that allows some SIM cards to be hacked...

It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get all the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world.
You can listen to today's Apple stories by clicking the inline player (requires...